picked this up off http://diggdot.us
http://www.eweek.com/article2/0,1895,1936666,00.asp It sounds disturbingly thourough, basically it exploits known flaws to let an attacker run a virtual machine monitor which then runs the original operating system as one of several partitions. Think Xen or VMWare installed without your knowledge and running your OS and apps just as before, you might notice a little network slowdown while your parasite launches a spam run or bittorrents someone's credit card database to their pals, but from within the OS you won't be able to tell... <snark>Yikes! Heavens to Betsy! We're Doomed I tell you Dooooooomed.</snark> It is a product of microsoft research, and they pointedly mention that both Windows and Linux were used as practice targets... Any bets on how long before this hits the wild... And installation is utterly undetectible, right? Doomed I tell you. -- http://Zoneverte.org -- information explained Do you know what your IT infrastructure does?
_______________________________________________ EUGLUG mailing list [email protected] http://www.euglug.org/mailman/listinfo/euglug
